CWNA-106 Certified Wireless Network Administrator Exam Set 1

What terms accurately complete the following sentence?The IEEE 802.11-2012 standard specifies mandatory support of the ___________ cipher suite for Robust Security Network Associations, and optional use of the ___________ cipher suite, which is designed for use with pre-RSNA hardware.


Options are :

  • TLS, SSL
  • CCMP, TKIP
  • 802.1X/EAP, WEP
  • RC5, RC4

Answer : CCMP, TKIP

PW0-104 Wireless LAN Administration Certified Practice Exam Set 4

ABC Company performs government contract work that requires disabling WLANs and has recently purchased an 802.11 Wireless Intrusion Prevention System (WIPS) to enforce their ďNO WIRELESSĒ network security policy.What attack type cannot be recognized by the WIPS?


Options are :

  • Packet capturing
  • Rogue APs installation
  • Deauthentication
  • Layer 3 DoS

Answer : Packet capturing

What statement describes the authorization component of a AAA implementation?


Options are :

  • Granting access to specific network servicesaccording to a user profile
  • Logging the details of user network behavior in order to review it at a later time
  • Validating client device credentials against a database
  • Verifying that a user is who he says he is

Answer : Granting access to specific network servicesaccording to a user profile

In addition to coverage analysis results, what should be included in a site survey report to ensure WLAN users experience acceptable performance?


Options are :

  • Application Layer protocol availability analysis results
  • Layer 4 protocol availability analysis results
  • WAN interface analysis results
  • Capacity analysis results

Answer : Capacity analysis results

PW0-104 Wireless LAN Administration Certified Practice Exam Set 5

You are an independent contractor, hired to perform an indoor site survey and network design for Luxury Full Service Hotels International. The network will support hotel staff and guest users. You are interviewing the network manager to determine business, performance, and security requirements for the future 802.11 WLAN.What questions should you ask the IT manager? (Choose 2)


Options are :

  • Who installed your existing wired network?
  • What types of applications will be used by the hotel staff?
  • How much RF loss do you expect between hotel rooms?
  • What data cabling is currently installed in the rooms and throughout the hotel?

Answer : What types of applications will be used by the hotel staff? What data cabling is currently installed in the rooms and throughout the hotel?

A company has hired you to perform a pre-deployment site survey of their facility. During an interview, the network manager informs you that the new wireless network must use 5 GHz bands and OFDM, and VoWiFi handsets will be used extensively over the wireless network.What items do you need to include in the RF site survey report? (Choose 2)


Options are :

  • Security parameters and configuration steps for VoWiFi handsets.
  • Codec types and sampling rates for each VoWiFi phone
  • A heat map demonstrating signal quality in areas where VoWiFi is supported.
  • Test results from an active survey with a VoWiFi handset

Answer : A heat map demonstrating signal quality in areas where VoWiFi is supported. Test results from an active survey with a VoWiFi handset

What item is essential for performing a manual RF site survey for a warehouse facility?


Options are :

  • Predictive site survey software that supports highly directional antennas
  • Low-gain omni antennas for APsmounted high on warehouse ceilings
  • I-Beam mounting kits for hanging temporary access points
  • A facility map with an explanation of applications used in each area

Answer : A facility map with an explanation of applications used in each area

CWNA-106 Certified Wireless Network Administrator Exam Set 2

What advantages does using predictive site survey modeling software offer over performing a manual site survey? (Choose 2)


Options are :

  • Predictive modeling software provides more reliable data than manual surveys when fine-tuning and validating access point placement after the installation.
  • Predictive modeling software can predict the ideal access point location 100% of the time, whereas the results from manual surveyingare less reliable.
  • Predictive modeling software makes it simple to assess multiple different AP locations and then adjust and display the APís expected coverage pattern in almost real-time.
  • It takes less time to create an initial site survey for a large facility when using predictive modeling software than when performing a manual survey.

Answer : Predictive modeling software makes it simple to assess multiple different AP locations and then adjust and display the APís expected coverage pattern in almost real-time. It takes less time to create an initial site survey for a large facility when using predictive modeling software than when performing a manual survey.

What is an advantage of using WPA2-Personal instead of WEP-128 as a security solution for 802.11 networks?


Options are :

  • WPA2-Personal uses 802.1X/EAP for authentication, and WEP-128 uses preshared keys.
  • WPA2-Personal uses CCMP for encryption, and WEP-128 uses TKIP for encryption.
  • WPA2-Personal usesdynamic encryption keys, and WEP-128 uses static keys.
  • WPA2-Personal is based on IEEE 802.11 industry standards, but WEP is not.

Answer : WPA2-Personal usesdynamic encryption keys, and WEP-128 uses static keys.

You are onsite with a client to perform a post-deployment site survey. When verifying a multiple channel VoWiFi deployment using a VoWiFi handset, which aspect is most important?


Options are :

  • Configuring DSCP-to-802.11e QoS maps on the handset for each access category.
  • Testing a constant conversation orhandset tone while roaming from area to area, or performing an active survey
  • Performing protocol analysis with a single wireless adapter that is scanning all channels in use
  • Verifying the VHT functionality to handle the call volume incurred by a single VoIP phone call.

Answer : Testing a constant conversation orhandset tone while roaming from area to area, or performing an active survey

PW0-105 Certified Wireless Network Administrator CWNA Exam Set 1

In WLAN security, which authentication method always create Layer 2 dynamic encryption keys?


Options are :

  • WEP
  • EAP-TLS
  • Shared Key
  • HTTPS Captive Portal

Answer : EAP-TLS

You are selecting antennas for a WLAN operating in the 5 GHz frequency band. What specifications should be evaluated for an antenna before it is implemented in this WLAN system?


Options are :

  • TPC support
  • 802.11ad compatibility
  • Impedance in Ohms
  • Return Loss Rating

Answer : Impedance in Ohms

The IEEE 802.11-2012 standard requires VHT capable devices to be backward compatible with devices using which other 802.11 physical layer specification (PHY)?


Options are :

  • OFDM
  • DSSS
  • ERP-PBCC
  • HR/DSSS

Answer : OFDM

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 1

What statement accurately describes the RF cables and connectors that are used in an 802.11 WLAN system?


Options are :

  • Large diameter RF cables cause greater loss than small diameter cables.
  • Some RF connectorsdo not cause insertion loss.
  • Two RF connectors of the same type (e.g. SMA), manufactured by different companies, may vary in specifications.
  • 75 and 125 ohms are the typical impedances of 802.11 WLAN connectors.

Answer : Two RF connectors of the same type (e.g. SMA), manufactured by different companies, may vary in specifications.

You were previously onsite at XYZís facility to conduct a pre-deployment RF site survey. The WLAN has been deployed according to your recommendations and you are onsite again to perform a post-deployment validation survey.When performing this type of postdeployment RF site survey for VoWiFi, what are two steps that must be performed? (Choose 2)


Options are :

  • Coverage analysis to verify appropriate coverage and roamingboundaries
  • Frequency-band hopping analysis to detect improper RF channel implementations
  • Application analysis with anactive phone call on a VoWiFi handset
  • Spectrum analysis to locate and identify RF interference sources

Answer : Coverage analysis to verify appropriate coverage and roamingboundaries Application analysis with anactive phone call on a VoWiFi handset

As you prepare for a site survey in a multi-floor corporate office, you have learned about several wireless devices that support connection-oriented, real-time applications. These applications are sensitive to service interruptions and require excellent signal quality, low latency, and low loss. For that reason, it is important to identify sources of RF interference as well as building characteristics that would cause RF blockage or dead spots.What systems or environmental characteristics are most likely to cause interference or RF blockage and disrupt service for these applications? (Choose 2)


Options are :

  • RFID chokepoints
  • Microwave ovens
  • Narrow hallways
  • Elevator shafts

Answer : Microwave ovens Elevator shafts

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 2

Your consulting firm has recently been hired to complete a site survey for a company. Your engineers use predictive modeling software for surveying, but the company insists on a pre-deployment site visit.What task should be performed as part of the predeployment visit to prepare for a predictive survey?


Options are :

  • Evaluatethe building materials at ABCís facility and confirm that the floor plan documents are consistent with the actual building.
  • Install at least one AP on each side of the exterior walls to test for co-channel interference through these walls.
  • Test several antenna types connected to the intended APs for use in the eventual deployment.
  • Collect information about the companyís security requirements and the current configuration of their RADIUS and user database servers.

Answer : Evaluatethe building materials at ABCís facility and confirm that the floor plan documents are consistent with the actual building.

Users and Network support personnel at a mid-sized equipment manufacturer have been discussing the potential uses and benefits of implementing an indoor WLAN. The network administrator and network manager have requested a meeting of senior management personnel to discuss a WLAN implementation before performing a site survey or taking any implementation steps. The first topic of discussion in the meeting is the corporate policy concerning implementation and use of WLAN technology.What specific topics are appropriate in this policy meeting? (Choose 2)


Options are :

  • Use of the latest 802.11ac equipment
  • Antenna types
  • Business justification
  • User productivity impact

Answer : Business justification User productivity impact

You are being interviewed by ABC Company for employment as a wireless site survey expert. The interviewing manager asks you what items should be included in a site survey report generated as part of a manual site survey process.What answer would be accurate?


Options are :

  • RF heat map illustrating coverage and signal quality for each frequency band
  • Itemized list of equipment, licenses, and support contracts required for the facility
  • Documentation noting how each WLAN user group will authenticate to the network
  • Documentation proving proper entry of wall material types into the site survey software

Answer : RF heat map illustrating coverage and signal quality for each frequency band

CWNA-106 Certified Wireless Network Administrator Exam Set 1

The network administrator at XYZ Company recently attended a training class on wireless security and realized that he should update the corporate security policy to address WLAN technology. The network administrator is listing the items that should be addressed in the security policy update, and has asked for your input.What WLAN topics should be addressed by a company security policy? (Choose 3)


Options are :

  • Training of the IT staff on WLAN operational security
  • Wired network performance analysis and baseline documentation
  • Wireless intrusion monitoring and response procedures
  • WLAN performance analysis baseline documentation
  • Theft prevention and data security of WLAN infrastructure devices

Answer : Training of the IT staff on WLAN operational security Wireless intrusion monitoring and response procedures Theft prevention and data security of WLAN infrastructure devices

What is a channel mode specified by the 802.11n (High Throughput) PHY?


Options are :

  • 22 MHz
  • 20/40 MHz
  • Frequency Hopping
  • 80 MHz

Answer : 20/40 MHz

XYZ Company has hired you to perform an indoor site survey of their 5-story facility. They own the building and rents out unused floors (floors 2 and 4) to other companies, and the other companies already use 802.11 WLANs. XYZ Company wants all of the offices they occupy to be surveyed as part of the project.What actions should be recommended as part of the site survey project? (Choose 2)


Options are :

  • Verify that RF signals from XYZ Companyís APs are not penetrating outside the perimeter of the building.
  • .Locate wiring closets on each floor occupied by XYZ Company.
  • Determine how much signal strength is passing between floors
  • Identify security best practice violations on neighboring WLANs.

Answer : .Locate wiring closets on each floor occupied by XYZ Company. Determine how much signal strength is passing between floors

PW0-105 Certified Wireless Network Administrator Exam Set 1

When performing a site survey for a Multiple Channel Architecture (MCA) system in a multi-tenant building with five floors, what aspect should you, as the site surveyor, keep in mind?


Options are :

  • The channel reuse pattern should be three dimensional with the RF cell extending coverage of each access point to other floors.
  • The Fresnel Zone is completely blocked between floors so each floor is considered a separate site survey.
  • The omni-directional antennas of the access points should be oriented parallel to the floor to maximize the coverage pattern across as many floors as possible.
  • The RF interference caused by passing airplanes supporting on-board Wi-Fi should be a prime consideration.

Answer : The channel reuse pattern should be three dimensional with the RF cell extending coverage of each access point to other floors.

What factors will have the most significant impact on the amount of wireless bandwidth available to each station within a BSS?


Options are :

  • The layer 3 protocol used by each station to transmit data over the wireless link
  • The power management settings in the access pointís beacons
  • The presence of co-located (10m away) access points on non-overlapping channels
  • The number of client stations associated to the BSS

Answer : The number of client stations associated to the BSS

ABC Company is planning to install a new 802.11ac WLAN, but wants to upgrade its wired infrastructure first to provide the best user experience possible. ABC Company has hired you to perform the RF site survey. During the interview with the network manager, you are told that the new Ethernet edge switches will support VoIP phones and 802.11 access points, both using 802.3 PoE.After hearing this information, what immediate concerns do you note?


Options are :

  • The edge Ethernet switches should support Ether-channel to get the best results out of the network.
  • VoIP phones and 802.11 access points should not be powered by the same edge switch due to distortion.
  • If the switches are in optimal locations for VoIP phones, they are likely to be suboptimal locations for 802.11 APs.
  • The power budget in the edgeswitches must be carefully planned and monitored based on the number of supported PoE devices.

Answer : The power budget in the edgeswitches must be carefully planned and monitored based on the number of supported PoE devices.

PW0-071 Certified Wireless Technology Specialist Sales Exam Set 3

When designing a WLAN infrastructure implementation for high client density at a public venue such as a conference or stadium, what are common best practices? (Choose 2)


Options are :

  • Use directional antennas to isolate the RF propagation
  • Implement a band steering feature for dual-band clients
  • Use high-gain omnidirectional antennas to improve SNR
  • Configure APs to transmit at or near their maximum power setting

Answer : Use directional antennas to isolate the RF propagation Implement a band steering feature for dual-band clients

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 5

Why is it recommended for a wireless network administrator to disable 1 Mbps and 2 Mbps data rates on the WLAN infrastructure? (Choose 2)


Options are :

  • To improve capacity in the BSS
  • To reduce the size of the APís effective service area
  • Toprevent 802.11b devices from associating
  • To maximize the range of the highest data rates

Answer : To improve capacity in the BSS To reduce the size of the APís effective service area

For what likely reasons might an organization choose to purchase an AP designed for outdoor deployment to use as an indoor WLAN AP at an industrial facility? (Choose 2)


Options are :

  • Protection from environmental conditions
  • Reduce transient RF interference
  • Aesthetic requirements
  • Physical security and theft prevention

Answer : Protection from environmental conditions Physical security and theft prevention

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.Your manager suggests implementing these security practices. What response should you give to this suggestion? (Choose 2)


Options are :

  • Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.
  • This security practice prevents manufacturersí client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.
  • Although it does not benefit the security posture, hiding the SSID in Beacons and Probe Response frames can be helpful for preventing some users (such as guests) from attempting to connect tothe corporate network.
  • Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons and Probe Responseframes. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

Answer : Although it does not benefit the security posture, hiding the SSID in Beacons and Probe Response frames can be helpful for preventing some users (such as guests) from attempting to connect tothe corporate network. Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons and Probe Responseframes. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

CWNA-106 Certified Wireless Network Administrator Exam Set 2

If an 802.11 RF transmission reaches a receiving antenna simultaneously by direct and reflected paths, what effect will the reflected signal have on the signal that took the direct line-of-sight path?


Options are :

  • The direct signal will only be received if the reflected signal is more than 180 degrees out of phase.
  • The signals will be distorted if the indirect signal arrives simultaneously at the receiver, but 90 degrees out-of-phase.
  • The direct signal cannot be received if the indirect signal is less than 90 degrees out-ofphase.
  • If the signalsare in-phase, they will combine together, cancel one another out, and create a null.

Answer : The signals will be distorted if the indirect signal arrives simultaneously at the receiver, but 90 degrees out-of-phase.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions